Congressional Budget Justification and Performance Budget Goals, Fiscal Year 2008 Congressional Budget Justification and Performance Budget Goals (CBJ) – 101 pages, PDF. Continue Reading
Congressional Budget Justification and Performance Budget Goals, Fiscal Year 2008 Congressional Budget Justification and Performance Budget Goals (CBJ) – 101 pages, PDF. Continue Reading
Strategic Plan FY 2007-2012 (PDF) – “This strategic plan establishes our vision and seeks to provide a roadmap for OIG to provide a worthy return on the United States taxpayers’ investment.” Semiannual Report to Congress FY2007 – First Half – No. 57 (PDF) Major Management Challenges (August 2007) (PDF) Continue Reading
2007-40-125 Taxpayer Service Savings Estimates for Fiscal Years 2006 and 2007 Could Not Be Validated, Report Date: 08/13/2007 >>Audit Highlights: PDF | HTML >> Audit Reports: PDF | HTML 2007-20-117 Efforts Have Been Made, but Manager and Employee Noncompliance With Security Policies and Procedures Puts Personally Identifiable Information at Risk, Report Date: 08/13/2007 >>Audit Highlights:… Continue Reading
INTERIM REPORT, Hurricane Katrina: A Review of Wind Versus Flood Issues, OIG-07-62 (PDF, 25 pages) – New 08/13/2007 Better Management Needed for the National Bio-Surveillance Integration System Program, OIG-07-61 (PDF, 38 pages) – New 08/13/2007 Improvements to Information Sharing are Needed to Facilitate Law Enforcement Efforts During Disasters, OIG-07-60 (PDF, 51 pages) – New 08/13/2007… Continue Reading
“Safeselling.org offers a resource for business people launching ecommerce enterprises and for businesses venturing into online sales. First-time entrepreneurs and established small to medium-sized business expanding their horizons should find helpful information on this site about selling goods and services online…Safeselling.org is a companion to safeshopping.org, an earlier project of the Cyberspace Law Committee of… Continue Reading
Trends in Public Spending on Transportation and Water Infrastructure, 1956 to 2004, August 2007 [37 pages, PDF] and Data Files [WebAppendix.pdf >> TableB-2.xls >> SupplementalTables.xls] Continue Reading
D-2007-115 Army Information Technology Enterprise Solutions-2 Services Contract (August 9, 2007) (Project D2006-D000AS-0173.000) PDF and Summary D-2007-114 DoD Garnishment Program (July 19, 2007) (Project D2005-D000FC-0264.000) PDF and Summary: “Active, reserve, and retired military and Federal civilian employees have pay garnished to pay personal and commercial debts…During FY 2005, the Defense Finance and Accounting Service Garnishment… Continue Reading
“The United States Election Assistance Commission (EAC) has released two best practices guidebooks to help election officials recruit, train, and retain poll workers. [See] Successful Practices for Poll Worker Recruitment, Training and Retention and A Guidebook for Recruiting College Poll Workers.” Continue Reading
PC World: Study Finds Spam’s Achilles Heel – “Researchers say they’ve discovered a critical weakness in the spam infrastructure.” Spamscatter: Characterizing Internet Scam Hosting Infrastructure, David S. Anderson, Chris Fleizach, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the USENIX Security Symposium, Boston, MA, August 2007. See also The New Yorker, Damn Spam, The losing… Continue Reading
Press release: “One of the latest reports from Javelin Strategy & Research shows why financial institutions must engage in blogging now, and provides specific steps for assessing this powerful new brand-building and customer-connection capability into 2008-10 strategic plans. According to the study of over 3,500 consumers, one in five online consumers read blogs, yet blogs… Continue Reading
The Defense Freedom of Information Policy Office (DFOIPO) is responsible for the formulation and implementation of Freedom of Information Act (FOIA) policy guidance for the Department of Defense (DoD) OSD/JS FOIA Requester Service Center Reading Rooms Continue Reading
Freedom and Information: Assessing Publicly Available Data Regarding U.S. Transportation Infrastructure Security, August 8, 2007: “This report concerns the feasibility of obtaining information relevant to planning terrorist attacks from publicly available sources. To the extent that such information is available, it is particularly valuable to terrorist planners in that it can generally be obtained at… Continue Reading